Get Smart – Apply Threat Intelligence for Securing the Enterprise Network

By: Ashraf Sheet, regional director, Middle East and Africa at Infoblox   In a world in which cyber criminals are becoming increasingly stealthy and using increasingly sophisticated techniques, from ransomware to DNS hijacking, it is becoming more difficult, more expensive and less effective for businesses alone to defend themselves against threats. According to researchrecently carried out in the US and EMEA by the Ponemon Institute on behalf of Infoblox, more organisations than ever are reaching out to sources including their peers, industry groups, IT vendors and government bodies for threat intelligence data. This increase could be attributed to the fact … Continue reading Get Smart – Apply Threat Intelligence for Securing the Enterprise Network

Infoblox Research Finds Explosion of Personal and IoT Devices on Enterprise Networks Introduces Immense Security Risk

Infoblox Inc., the network control company that provides Actionable Network Intelligence, today announced new research that exposes the significant threat posed by shadow devices on enterprise networks. The report titled “What’s lurking on your network: Exposing the threat of shadow devices” found that enterprise networks across the US, UK and Germany have thousands of shadow personal devices – such as laptops, kindles and mobile phones – and Internet of Things (IoT) devices – such as digital assistants and smart kitchen appliances – connecting to their network. Over a third of companies in the US, UK and Germany (35 percent) reported … Continue reading Infoblox Research Finds Explosion of Personal and IoT Devices on Enterprise Networks Introduces Immense Security Risk

Hybrid Approach to Security Needed for Maximum Protection Against Cyber Attacks

By: ‎Ashraf Sheet, Regional Director Middle East & Africa at ‎Infoblox Are Software-as-a-Solution (SaaS) security solutions truly the panacea they are publicized to be? The answer is, it depends on how the SaaS solution is architected. A majority of SaaS-only security solutions are “overlay” solutions that simply provide an additional layer of security on top of an enterprise’s existing network and security infrastructure. These overlay solutions are easy for the vendor to develop, but difficult for the customer to combine with other existing security solutions and derive value from. In contrast, a hybrid approach to security is one that tightly … Continue reading Hybrid Approach to Security Needed for Maximum Protection Against Cyber Attacks

New Age Cyber Security Threats and Defence Strategies for 2018

By: ‎Ashraf Sheet, Regional Director Middle East & Africa at ‎Infoblox   Today there is no doubt that cyber security is one of the hottest topics in the realm of Information Technology. With almost every new technology trend there is a new form of cyber-security that evolves with it. With the advent of the relatively new technology initiatives that we are seeing today such as Internet of Things(IoT), Next Generation Data Centre (NGDC), cloud adoption whether it is public/private/hybrid, Digital Economy, IT Compliance, BYoD, Shadow IT, and few others – cyber security has to address all of these trends. With … Continue reading New Age Cyber Security Threats and Defence Strategies for 2018